Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación

Descargar
Página de 8
 
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(4)JA1
OL-8219-01
Caveats
Caveats
This section lists open caveats in Cisco IOS Release 12.3(4)JA and and resolved caveats in Cisco IOS 
Release 12/3(4)JA and 12.3(4)JA1.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(4)JA:
CSCsa72936—The results for the show controller d0 command do not include the radio serial 
number. 
Workaround: Enter show interface d0 mem 5fd4 12 in privileged EXEC mode and then do a 
hexadecimal/ASCII conversion on the 12-byte result. This example shows the command and the 
command output:
AP# sh int d0 mem 5fd4 12
5FD4: 4F46 3043 3338 4234 4831 004C
The 12-byte output converts to the ASCII serial number FOC0834B1HL.
Resolved Caveats in Cisco IOS Release 12.3(4)JA1
The following caveat is resolved in Cisco IOS Release 12.3(4)JA1:
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow 
vulnerability. Cisco has included additional integrity checks in its software, as further described 
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected 
customers.
This advisory is posted at 
.
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated 
functionality. These changes have no impact on system operation or feature availability.
Resolved Caveats in Cisco IOS Release 12.3(4)JA
These caveats are resolved in Cisco IOS Release 12.3(4)JA:
CSCed36477—The CLI now warns users that bridges do not support different encryption settings 
on multiple VLANs.
CSCef60659—A document that describes how the Internet Control Message Protocol (ICMP) could 
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control 
Protocol (TCP) has been made publicly available. This document has been published through the 
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks 
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of 
three types: